Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Jinfornet Jreport 15.6 - Local File Inclusion" module is designed to detect a vulnerability in the Jinfornet Jreport 15.6 software. This vulnerability, classified as CWE-22, allows for local file inclusion through the Jreport Help function in the SendFileServlet. The severity of this vulnerability is high, with a CVSS score of 7.5.
Author: 0x_Akoko
If exploited, this vulnerability allows remote unauthenticated users to view sensitive files on the target system. In this case, it allows access to the "/etc/passwd" file, which contains important system information, such as user account details.
The module sends an HTTP GET request to the target system with a specific path that includes directory traversal sequences. For example:
/jreport/sendfile/help/../../../../../../../../../../../../../../etc/passwd
The module then applies matching conditions to the response to determine if the vulnerability is present. The matching conditions include:
- Checking if the response body contains the string "root:[x*]:0:0" - Verifying that the response status code is 200If both conditions are met, the module reports the vulnerability.